MIS Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of these aggregate data from numerous databases and sources of data for fast online queries and exploration?

Data warehouse

What value will display if the following formula (note the missing equal sign) was entered into a cell in MS Excel? $55.00 + 5 $60.00 $55.00 + 5 $60 60

$55.00 + 5

Information system consists of

1. Hardware 2. Software 3. Data 4. Procedures 5. People

Given the following spreadsheet Cell A3 has the formula =$A1+A$2. Copying the contents of cell A3 to cell B3 gives the following result in B3: 5 10 #value 15

10

A terabyte is approximately: 1000 bytes 1000 Kb 1000 Mb 1000 Gb

1000 Gb

The computer uses binary code to store numbers. What is 10011 in decimal? 10,011 13 17 19

19

Given the following spreadsheet Cell A3 has the formula =SUM(A1:A2). Copying the contents of cell A3 to cell B3 gives the following result in B3: 10 Blank 15 5

5

Markup language

Definition: A general term that indicates the separation of the formatting of a document and the content of a document. See also Hypertext Markup Language (HTML).

Extensible Markup Language (XML)

Definition: A markup language that uses customizable tags to describe data and its relationship to other tags.

nested tags

Definition: An HTML tag included within another HTML tag.

Information technology has made many innovations possible. Which of these statements is WRONG about some of those innovations? Uber, the world's largest taxi service, owns no vehicles for hire Facebook, does not create media content. Airbnb, the world's largest accommodation provider, owns several major hotel corporations The world's most valuable retailer, China's Alibaba, also owns no product inventory of its own

Airbnb, the world's largest accommodation provider, owns several major hotel corporations

Allowing third-party sellers to list their products on Amazon is controversial. Why would Amazon allow products sold by others to appear on its site? Selection attracts consumers. A network effect competitive advantage is created where more buyers attract more sellers, giving Amazon an advantage over any rival attempting to create a similar marketplace. Although products are sold by third parties, Amazon gains valuable data on things such as customer browsing habits and sales. Amazon's brand is reinforced as a first-choice shopping destination. All of the above.

All of the above.

Which of these is NOT a case study of data analytics American Airline SABRE's eletronic reservation system Moneyball Netflix Cinematch Google Flu Trends

American Airline SABRE's eletronic reservation system

What happens when dollar signs ($) are entered into a cell address? (not into the cell itself) (e.g. $B$2:$B$10) The cell format changes to character An absolute cell address is created. The cell will be formatted as currency Cell address will change when it is copied to another cell

An absolute cell address is created.

Tech firms are among the best performing firms in the world. According to the text, which firm is the most valuable firm in the United States, and has also posted some of the most profitable quarters of any business in any industry? Google IBM Apple Amazon

Apple

World Wide Web Consortium

Definition: The organization that establishes standards and specifications that identify how a browser interprets HTML code.

When working in charts in Excel, and you wish to change the title, legend and data labels, what part of the chart needs to be changed?

Chart elements

Which of these is NOT a reason why is data analytics a hot topic today? Computers are making it possible to analyze statistical data More data has been collected in the past several years than the collection of data in the whole history of mankind before that Companies realizing that they are sitting on mountains of valuable data Technology has improved that is enabling easy collection and analysis of valuable data

Computers are making it possible to analyze statistical data

Which of the following is a major implication of Moore's Law? The size of integrated chips has increased. Data processing activities have become complex and time-consuming. Costs of communications and storage have become very low. Costs of computing and processing have increased.

Costs of communications and storage have become very low.

Data is stored in databases that become part of a system that creates, maintains and manipulates data called the: Database DBMS EXTRANET ROM

DBMS

Anyone can buy information technology. _______ is the strategic asset that is really valuable, rare, difficult to duplicate and have few substitutes. Software Computers Data Mainframes

Data

Which of the following is a valid statement on digital security? Technology is solely responsible for almost all security breaches Security breaches cannot be prevented despite the adoption of the best security policies Digital security is everybody's responsibility Greater expenditure on security products is the only way to contain security breaches

Digital security is everybody's responsibility

__________ attacks via the Internet refer to cyber criminals using "zombie" computers or botnets to repeatedly hit on a victim's website with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines. Spoofing Distributed denial of service (DDoS) Malware Sniffing

Distributed denial of service (DDoS)

Which of the following is an open-source Web browser? Internet Explorer Ubuntu Firefox Apache

Firefox

What is the Moneyball data analytics case about? Getting value from athlete's performance data regardless of ranking or salary Matching online searches for flu-related symptoms to actual flu occurrences Finding possible remedies for flu-related symptoms Matching gambling data with salary data

Getting value from athlete's performance data regardless of ranking or salary

Sergey Brin and Larry Page were both twenty-something doctoral students at Stanford University when they founded: Yahoo! Google Facebook Amazon

Google

Quiz 1

Importance of MIS

What best describes the hardware/software development which allows objects to connect to a network and share data with any other application, service, or device? IoT self-driving cars 3D printing visual mapping

IoT

Which of the following statements is NOT true about information? One person's information can be another person's data Information is rarely contextual. Information is always subjective The context in which information is understood varies from user to user.

Information is rarely contextual.

Taking advantage of the "long tail" offered Amazon's customers _______ which is considered one of the three 'pillars' critical to Amazon's business success? Large selection Niche customers Inimitable technology Dynamic pricing Firm-owned brands

Large selection

________ is a version of the operating system Unix that was developed by an open source community. Symbian OS Android Linux Mac OS

Linux

Which of these impacts of technology on different industries is CORRECT? SEO and SEM are key tech industry acronyms that have become vital parts of the accounting professional's operating toolkit. Firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze One arena that has not been affected by technology is politics Many of the careers in marketing are highly tech-centric

Many of the careers in marketing are highly tech-centric

Which of these techniques is about identifying sales patterns and what products customers tend to buy together? Market basket analysis RFM analysis Online Analytical Processing (OLAP ) Drilling down

Market basket analysis

What is the Google Flu Trends data analytics case about? Matching online searches for flu-related symptoms to actual flu occurrences Getting value from athlete's performance data regardless of ranking or salary Finding possible remedies for flu-related symptoms Tracking flu symptoms using CDC data

Matching online searches for flu-related symptoms to actual flu occurrences

Which of these IS NOT a safeguard to prevent threats to your personal and organizational digital security Never backup your data. Backup are prone to security attacks Only enter sensitive information that are encrypted and secured using SSL (https) Never download or launch email attachments without checking the source Always install latest updates to the operating system and application software

Never backup your data. Backup are prone to security attacks

When starting up a new blank document, MS Word applies the _______ template which contains the default Office theme, default body font, headings and line spacing. You can modify this template to match your preferences. Office 2016 Basic Normal Universal

Normal

Which of these is WRONG about word processing? Only character-level formatting is possible. Whole paragraphs cannot be formatted Heading 1 is the highest level used for the major headings in a document and applies the most noticeable formatting One of the most useful features of a word-processing program is the ability to move text easily You can search for formatting in the same way that you can search for text

Only character-level formatting is possible. Whole paragraphs cannot be formatted

Assuming that the "Body Text" style is one of the styles available in MS Word. What happens if you modify this style in a MS Word document? Nothing happens, it is is not possible to change the Body Text style All paragraphs in the document will be changed Only the paragraph where the cursor is inserted is changed Only those paragraphs formatted with the Body Text style will be changed

Only those paragraphs formatted with the Body Text style will be changed

Which of the following represents one of the primary activities of the value chain? Outbound logistics Firm infrastructure Human resource management Research and development Procurement

Outbound logistics

Ronald runs both Windows 7 and Linux on his personal computer. This process is called ________. PC virtualization server virtualization ' cloud computing desktop virtualization

PC virtualization

The case study of the government's website application healthcare.gov that failed miserably when it was launched, demonstrates how difficult information systems development can be. All of these contributed to the failure of the system EXCEPT: Late changes to the requirements of the site Unclear goals and expectations Poor technologies used by prospective customers Lack of support and oversight from the executive level

Poor technologies used by prospective customers

Main (primary) memory is also known as ________. CPU ROM RAM HDD ' Dual-core processor

RAM

Which of these is NOT considered a type of data analytics? SQL descriptive analytics predictive analytics prescriptive analytics

SQL

Which of the following statements holds true for the term encryption? Highly restrictive programs that permit communication only with approved entities and/or in an approved manner Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source A technique using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key

refers to performing different tasks than rivals or the same tasks in a different way. Straddling Operational effectiveness Strategic positioning Vertical integration Scale advantage

Strategic positioning

Which universal language is used for creating, maintaining and managing as well as retrieving data and information from databases C Structured Query Language (SQL) Visual Basic Common Business-Oriented Language (COBOL)

Structured Query Language (SQL)

Using MS Word, the easiest way to format paragraphs with similar fonts, line spacing and justification is to use: Page layout Styles References Symbols

Styles

Which of these statements about information technology is NOT correct? The United States holds the number one ranking in Internet access speeds. Sales in Apple's app store are so large, that they would be ranked as a Fortune 500 firm if the figure were broken out as a firm separate from Apple. The rise of open source software has lowered computing costs for startup and blue chip companies worldwide. Data analytics and business intelligence are driving discovery and innovation.

The United States holds the number one ranking in Internet access speeds.

Some of the most common guidelines for designing a secure password include: The password should be at least eight characters long and include at least one number, upper and lower case and other special (non-alphabet) characters The password should be short and straightforward The password should include names of family members or pets, so as to be easily remembered Choose a hard-to-guess password, then re-use this hardened password across websites

The password should be at least eight characters long and include at least one number, upper and lower case and other special (non-alphabet) characters

Which of these is NOT a reason why you would use tables in an Excel spreadsheet? To manage a structured range of data separate from other data in a worksheet To easily add, delete, sort and filter subsets of data in a specific range in the worksheet To format similar ranges or sections of data To use different formulas in different rows in the worksheet

To use different formulas in different rows in the worksheet

Which question is about descriptive analytics? What is happening? What will happen Why will it happen? What should I do?

What is happening?

Which of these is about predictive analytics What will happen? What happened? What is happening? What should I do?

What will happen?

The ____________ is the final test of the new system where the developers and users jointly verify that the new information system works as required. acceptance test unit test alpha test system test

acceptance test

The placement of paragraph text relative to the left and right margins is referred to as: line spacing line break columns alignment

alignment

Which of these forces correctly represent Porter's five forces that shape a firm's competitiveness within the industry? bargaining power of customers, bargaining power of suppliers, threat of substitutes, threat of new entrants, firm rivalry value chain, differentiation, cost leadership, firm rivalry, innovation bargaining power of customers, bargaining power of suppliers, cost leadership, firm rivalry, innovation differentiation, cost leadership, firm rivalry, innovation, cost leadership

bargaining power of customers, bargaining power of suppliers, threat of substitutes, threat of new entrants, firm rivalry

Based on the case studies in the textbook, the costs of a digital security breach to a business like Target, TJX (TJ Maxx, Marshalls), Home Depot, etc., are not only in the ________ in terms of loss, reissuing of credit cards, payouts to court-imposed restitution, legal fees and more, but also damage to the firm's reputation and long-term profitability. billions of dollars tens of millions of dollars millions of dollars hundreds of thousands of dollars

billions of dollars

Web applications are typically limited by the capabilities of the ________. programming language browser hardware operating system

browser

Which of these provide the software tools and infrastructure ad-hoc reporting capabilities and dashboards that help businesses make better decisions and leverage the data they collect? SQL business intelligence tools legacy systems spreadsheets

business intelligence tools

The _____ measures the percentage of people who clicked on an ad to arrive at a destination-site. click landing-page rate click churn rate click-through rate double-click rate

click-through rate

A primary key used in a database is a ________. column or group of columns that identifies a unique row in a table group of rows that are formed to identify a unique table or file group of tables or files formed to identify a unique field or row character or byte that represents fields or columns

column or group of columns that identifies a unique row in a table

When working with charts in Excel, and the selected range of values is taller than it is wide, Excel assumes that the category values and data are laid out in _________ rows columns the data series diagonally

columns

In the textbook, Walmart is able to design its product mix right under all sorts of varying environmental conditions, protecting the firm from "a retailer's twin nightmares: too much inventory, or not enough" with the help of spreadsheets data mining point-of-sale systems transaction processing systems

data mining

Which of these techniques is part of predictive analytics? data mining business reporting dashboards data warehousing

data mining

Which of these techniques of data analytics is an offshoot of artificial intelligence? decision tree learning Business reporting RFM analysis Online Analytical Processing (OLAP )

decision tree learning

While most computer stores sell standard PC models, Dell.com offers a website that allows buyers to customize their PC specifications. By doing this, which strategic positioning is Dell.com following? differentiation raise barriers to market entry lock in buyers and customers reduce costs growth

differentiation

In a relational database, the columns are also called: records tables fields files

fields

Which of these functions in Excel allows you to display selected rows based on some criteria and hide other rows? filters formulas pivot table conditional formula

filters

The speed of a CPU is expressed in cycles called ________ hertz knot Mach rev

hertz

he phase of the systems development life cycle (SDLC) that writing code for the application, testing the code, training users and converting data is ____________ planning implementation design analysis

implementation

Data becomes _____ when it is presented in a context so that it can answer a question or support decision-making database wisdom knowledge information

information

As part of the inbound logistics and operations activity of its value chain, Amazon applies __________ strategies by using Kiva robots and other warehousing technologies to continuously improve sales and fulfilment processes differentiation raise barriers to market entry lock in buyers and customers innovation

innovation

The task of systems analysis and design focuses on ________ programming software engineering building networks involves people, procedures, computers, communications networks, and software to develop information systems according to the phases of an SDLC

involves people, procedures, computers, communications networks, and software to develop information systems according to the phases of an SDLC

Programs like viruses, worms, spyware, keylogger, screen capture are all terms that are collectively called _________ social engineering DDoS malware hacking

malware

The space between the text and the top, bottom, left and right edges of the paper are referred to as: page spacing line spacing alignment margins

margins

Managing a very long document can be cumbersome especially when several people are working on different parts and the formatting and page numbering need to be consistent. In MS Word the ________________ feature allows different people to work on separate files simultaneously which can be quickly organized into a single, complete document. master and subdocument styles themes templates

master and subdocument

The long tail is a phenomenon whereby IT-enabled firms can make money by: selling the same product at different prices with only minor tweaks in their design. leveraging customers to promote their products or services. reselling multiple versions of a single product under different brand names. offering a selection of products or services vastly greater than conventional retailers.

offering a selection of products or services vastly greater than conventional retailers.

Google's design is based on a kind of search called the ______ search where the results of the search and how pages are ranked are based on the number of pages linking to them, i.e, its natural popularity organic PageRank Search Engine Optimization (SEO) keyword

organic

When working on a long document, the _______ view enables paragraphs to be organized into levels so more content can be viewed and manipulated in a single screen without scrolling or searching through the whole document. design layout outline home

outline

Which of the following is a component of an information system, but not of information technology? software data hardware people

people

A bank customer receives a message, what appears to be from the bank's website, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here? phishing DDos Malware spoofing

phishing

Which of these functions in Excel allows you to summarize data from selected fields, view data from different perspectives and compare one item to another item (slicing and dicing the data) Excel tables VLOOKUP tables HLOOKUP tables pivot table

pivot table

The first phase of the systems development life cycle (SDLC), _______ involves agreeing on the goals of the project, its scope, estimate of the project costs and potential benefits and organization of the project team and a schedule analysis implementation design planning

planning

In a relational database, the rows are also called: tables fields files records

records

The ______________ that feeds into the design phase describe the way the information system's software should interact with users, store data, process data, and format reports requirements specifications project development plan development methodology testing plan

requirements specifications

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? phishing social engineering spoofing malware

social engineering

n MS Word, to format selected parts of the document in different formats (e.g. different margins, page numbering, headers and footers) you need to use: format breaks It is not possible to have different formats in one document section breaks page breaks

section breaks

Companies like Netflix and Amazon are able to differentiate themselves from traditional retailers like Blockbuster or Borders because they are not limited by _________ in offering customers what they want and when they want it. shelf space video piracy shipping costs distribution rights disintermediation

shelf space

Which of these functions in Excel allows you to summarize certain statistics about the data and view different outlines with the summaries filters subtotals formulas slicer

subtotals

A firm's financial performance that consistently outperforms its industry's peers is known as _____. comparative advantage absolute advantage sustainable competitive advantage first mover advantage operational efficiency advantage

sustainable competitive advantage

Often called the "Go Live" phase, the ____________ involves the process of deactivating an old information system and activating a new one system conversion system design system development system testing

system conversion

he easiest way to create a new document that has a specific style, text, graphics or any other elements you wish to recreate from a previous document is to use a(n):

template

Source code is computer code ________. that is written by humans that is not understandable by humans that is represented as bits and bytes that cannot be modified

that is written by humans

Management information systems (MIS) as a field of study is best defined as ________. the study of the theoretical foundations of algorithms and computation in computer systems the design and development of software applications and computer hardware the development and use of information systems that help businesses achieve their goals and objectives the use of computers in the field of management

the development and use of information systems that help businesses achieve their goals and objectives

Based on the textbook, Google's goal for building their system was to ___________________ Match companies' needs Provide the most advertising revenue they could get Offer search services for free to organize the world's information and make it universally accessible and useful

to organize the world's information and make it universally accessible and useful

One of the downsides brought about by new technologies is: the proliferation of telecommunications into the hands of a few unprecedented set of security and espionage threats the stagnation of advertising An overall increase in the costs of computing

unprecedented set of security and espionage threats

A (An) ________ is a type of virus that propagates itself in memory using the Internet or other computer networks causing them to crash Trojan horse adware worm spyware

worm


Set pelajaran terkait

Health Assessment Exam 3 Practice Questions

View Set

Introduction to Java Programming: Ch. 4 quiz

View Set

CHAPTER 7: Credit cards and consumer loans

View Set

1-Network Fundamentals - Basic Question_14548700_2023_01_05_20_23

View Set

PassPoint - Mood, Adjustment, and Dementia Disorders

View Set

NCLEX Questions for Nursing 102 Exam #2

View Set

Math SAT Level I - Chapter 4 Ratios and Proportions

View Set

E-business Management- Ch.10 Online Content and Media

View Set

Unit 17 - Alternative Investments and Other Assets

View Set